The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-3052

CVE-2025-3052: Microsoft UEFI Firmware RCE Vulnerability

CVE-2025-3052 is a remote code execution flaw in Microsoft signed UEFI firmware that enables arbitrary memory writes and execution of untrusted code. This article covers technical details, affected systems, and mitigations.

Updated: May 15, 2026

CVE-2025-3052 Overview

CVE-2025-3052 is an arbitrary write vulnerability in a Microsoft-signed Unified Extensible Firmware Interface (UEFI) module. The flaw lets an attacker control a write operation, leading to arbitrary memory writes that include modification of critical firmware settings stored in Non-Volatile Random-Access Memory (NVRAM). Because the affected module carries a valid Microsoft signature, it can load on Secure Boot-enabled systems. Successful exploitation enables Secure Boot bypass, persistent pre-OS implants, and full system compromise below the operating system trust boundary.

Critical Impact

An authenticated local attacker can tamper with NVRAM variables and bypass UEFI Secure Boot, establishing firmware-level persistence that survives operating system reinstalls.

Affected Products

  • Microsoft-signed UEFI firmware modules trusted under the Secure Boot allow list
  • Systems that ship with the vulnerable signed module in their firmware volume
  • Endpoints relying on UEFI Secure Boot to enforce pre-OS code integrity

Discovery Timeline

  • 2025-06-10 - CVE-2025-3052 published to the National Vulnerability Database (NVD)
  • 2026-04-15 - Last updated in NVD database

Technical Details for CVE-2025-3052

Vulnerability Analysis

The vulnerability resides in a Microsoft-signed UEFI application that performs an unvalidated write using attacker-influenced input. UEFI firmware executes in System Management Mode-adjacent privilege before the operating system loads. Because the signed binary is trusted by the Secure Boot db database, the Boot Manager loads it without rejecting its image hash. The arbitrary write primitive enables modification of any address in pre-boot memory, including the global gSecurity and gSecurity2 function pointers and NVRAM variables such as PK, KEK, db, and dbx.

An attacker who alters these variables disables image verification on subsequent boots. The result is execution of unsigned bootloaders, kernel drivers, or implants that persist across operating system reinstallation. The exploitation surface is local, but the impact crosses the firmware-to-OS trust boundary, producing a scope change reflected in the high integrity and confidentiality ratings.

Root Cause

The signed UEFI module accepts an externally controllable pointer and length, then writes to that destination without bounds or destination validation. The image carries a Microsoft third-party UEFI Certificate Authority signature, so revocation requires updating the Secure Boot dbx forbidden signatures database to reject the vulnerable binary hash.

Attack Vector

A local attacker with administrative privileges stages the signed vulnerable binary on the EFI System Partition (ESP) and configures the boot order or BootNext variable to execute it. On the next reboot, the firmware loads the trusted image, the attacker-controlled write primitive executes, and NVRAM Secure Boot variables are overwritten. Subsequent boots then accept attacker-supplied unsigned code. Refer to the Binarly Security Advisory BRLY-DVA-2025-001 and CERT Vulnerability ID 806555 for module-specific exploitation details.

Detection Methods for CVE-2025-3052

Indicators of Compromise

  • Unexpected entries on the EFI System Partition referencing the vulnerable signed binary hash listed in BRLY-DVA-2025-001
  • Modifications to PK, KEK, db, or dbx NVRAM variables outside of firmware update windows
  • Changes to BootOrder, BootNext, or Boot#### variables pointing to non-vendor loaders
  • Secure Boot reported as disabled or in Setup Mode on systems that previously enforced it

Detection Strategies

  • Compare measured boot Trusted Platform Module (TPM) PCR[0] and PCR[7] values against known-good baselines to identify firmware and Secure Boot policy drift
  • Use UEFI firmware integrity tools such as CHIPSEC to enumerate loaded drivers and validate NVRAM variable contents
  • Hunt for the vulnerable binary hashes published in the Binarly advisory across managed endpoints

Monitoring Recommendations

  • Forward Windows Microsoft-Windows-TPM-WMI and Measured Boot logs to a central data lake for baseline analysis
  • Alert on administrative writes to \EFI\ directories on the ESP from non-update processes
  • Track mokutil --sb-state and bcdedit output across the fleet to identify Secure Boot state changes

How to Mitigate CVE-2025-3052

Immediate Actions Required

  • Apply the latest dbx Secure Boot revocation update from Microsoft and OEM firmware vendors to block the vulnerable signed binary
  • Restrict administrative access on endpoints, since the attack vector requires high local privilege to stage the binary and modify boot variables
  • Validate Secure Boot is enabled and enforced after applying the revocation update

Patch Information

Microsoft has revoked the vulnerable signed module through the Secure Boot forbidden signatures database (dbx). Deploy the updated dbx payload through Windows Update on Windows systems and through fwupd or vendor tooling on Linux systems. Consult the UEFI Specification Section 32 for revocation mechanics and the CERT advisory for vendor-specific firmware update guidance.

Workarounds

  • Enable BitLocker or LUKS with TPM-bound keys so that PCR changes from firmware tampering invalidate disk decryption
  • Require firmware administrator passwords and disable booting from removable media in BIOS setup
  • Apply Windows Defender Application Control or Linux Integrity Measurement Architecture (IMA) policies to constrain post-boot code execution
bash
# Verify Secure Boot state and apply dbx update on Linux
mokutil --sb-state
sudo fwupdmgr refresh
sudo fwupdmgr update

# Verify Secure Boot state on Windows (PowerShell, elevated)
Confirm-SecureBootUEFI
Get-SecureBootPolicy

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechMicrosoft

  • SeverityHIGH

  • CVSS Score8.2

  • EPSS Probability0.07%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • Technical References
  • UEFI Specification Document

  • Binarly Security Advisory BRLY-DVA-2025-001

  • CERT Vulnerability ID 806555
  • Related CVEs
  • CVE-2026-32191: Microsoft Bing Images RCE Vulnerability

  • CVE-2026-21536: Microsoft Devices Pricing RCE Vulnerability

  • CVE-2021-24105: Package Manager Configurations RCE Flaw

  • CVE-2026-21531: Azure Conversation Authoring RCE Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the Most Advanced Cybersecurity Platform

See how the world’s most intelligent, autonomous cybersecurity platform can protect your organization today and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English